Abstract
Cloud Service Providers (CSP) offers several services over the internet to the cloud users. One of the predominant services offered to the cloud users is data storage. With the rapid growth of digital data, redundancy has become the bottleneck issue in cloud computing environment. Storing identical copies of user data increases the storage overhead. The traditional way of performing deduplication is by comparing the cipher texts, which will result in high time complexity and heavy load on users. To utilize the cloud storage effectively and to reduce the work load of cloud users, a novel inline data deduplication method is created based on Bloom filter. The proposed scheme combines the application of bloom filter and Cramer Shoup cryptosystem to perform secure inline deduplication. Two matrices are created such as keyword matrix and file matrix based on the application of the bloom filter to perform deduplication on the cloud storage. The empirical study of the proposed deduplication technique is carried out on the Eucalyptus v4.2.0 open source private cloud on top of the Xeon processor with 64 GB of RAM Speed. It has been observed that the proposed deduplication improves the efficiency and effectiveness of the deduplication compared to the traditional deduplication algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kenji, E.K., Jonathan, M., John, Z.: Diffusing the cloud: cloud computing and implications for public policy. J. Ind. Compet. Trade 11, 209–237 (2011)
Liu, Y., Sun, Y., Ryoo, J., Rizvi, S., Vasilakos, A.V.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9, 119–133 (2015)
Yan, Z., Ding, W., Yu, X., Zhu, H., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2, 138–150 (2017)
Waghmare, V., Kapse, S.: Authorized deduplication: an approach for secure cloud environment. In: International Conference on Information Security and Privacy (2016). Proc. Comput. Sci. 78, 815–823
Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 12, 644–654 (1976)
Xia, W., Jiang, H., Feng, D., Tian, L.: DARE: a deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads. IEEE Trans. Comput. 65, 1692–1705 (2016)
Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., Lou, W.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Forensic Secur. 12, 532–545 (2017)
Deng, F., Rafiei, D.: Approximately detecting duplicates for streaming data using stable bloom filters. In: Proceedings of the ACM International Conference on Management of Data, pp. 25–36 (2006)
Almeida, P., Baquero, C., Preguica, N., Hutchison, D.: Scalable bloom filters. Inf. Process. Lett. 101, 255–261 (2007)
Venish, A., Siva Sankar, K.: Study of chunking algorithm in data deduplication. In: Proceedings of the International Conference on Soft Computing System, Advances in Intelligent System and Computing, pp. 13–20 (2016)
Dal Bianco, G., Galante, R., Goncalves, M.A., Canuto, S., Heuser, C.: A practical and effective sampling selection strategy for large scale deduplication. IEEE Trans. Knowl. Data Eng. 27, 1–15 (2015)
Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 20, 1–11 (2014)
Mihir, B., Sriram, K., Thomas, R.: Message-locked encryption and secure deduplication. In: Proceedings of the Advances in Cryptography, pp. 296–312 (2013)
Li, W., Huang, K., Zhang, D., Qin, Z.: Accurate counting bloom filter for large scale data processing. Math. Probl. Eng. 4, 1–11 (2013)
Acknowledgement
The work of this paper is financially sponsored by Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India. The Grant Number is ECR/2016/000546.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohamed Sirajudeen, Y., Muralidharan, C., Anitha, R. (2020). Efficient Deduplication on Cloud Environment Using Bloom Filter and IND-CCA2 Secured Cramer Shoup Cryptosystem. In: Hemanth, D., Shakya, S., Baig, Z. (eds) Intelligent Data Communication Technologies and Internet of Things. ICICI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 38. Springer, Cham. https://doi.org/10.1007/978-3-030-34080-3_80
Download citation
DOI: https://doi.org/10.1007/978-3-030-34080-3_80
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34079-7
Online ISBN: 978-3-030-34080-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)